Tuesday, July 16, 2019

Asterisk 16.4.1 is Ready for You, Specially PJSIP and chan_sip Users.

The Asterisk 16.4.1 release has been made to address the security vulnerabilities that have been identified. Specially AST-2019-002, AST-2019-003 follow the links to learn about the r each vulnerability that includes additional information. Users of versions of Asterisk that are affected are strongly encouraged to review the advisories and determine what action they should take to protect their systems from these issues.
Security Advisories:
The data in this summary reflects changes that have been made since the previous release, asterisk-16.4.0.
https://downloads.asterisk.org/pub/telephony/asterisk/releases/?C=M;O=D

Download here 
2019-07-11 19:25 +0000  Asterisk Development Team <asteriskteam@digium.com>

 * asterisk 16.4.1 Released.

2019-06-12 13:03 +0000 [c2319178b2]  George Joseph <gjoseph@digium.com>

 * res_pjsip_messaging:  Check for body in in-dialog message

   We now check that a body exists and it has a length > 0 before
   attempting to process it.

   ASTERISK-28447
   Reported-by: Gil Richard

   Change-Id: Ic469544b22ab848734636588d4c93426cc6f4b1f

2019-06-28 11:15 +0000 [3c185d0620] 
Francesco Castellano <francesco.castellano@messagenet.it>

 * chan_sip: Handle invalid SDP answer to T.38 re-invite

   The chan_sip module performs a T.38 re-invite using a single media
   stream of udptl, and expects the SDP answer to be the same.

   If an SDP answer is received instead that contains an additional
   media stream with no joint codec a crash will occur as the code
   assumes that at least one joint codec will exist in this
   scenario.

   This change removes this assumption.

   ASTERISK-28465

   Change-Id: I8b02845b53344c6babe867a3f0a5231045c7ac87

0 comments:

Blog Widget by LinkWithin